Logging in...
User ID
:
Password
:
Register
Forgot your PIN?
Forgot my PIN
Enter your username and a recovery link will be emailed to the email address on file at your library.
User ID
:
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Rooms Restriction Values
All Fields
Title
Author
General Note
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
Preferred Shelf Number
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
To enable accessibility mode, return to the beginning of the page and use the link in the menu bar.
Advanced Search
Home Room
Book Collection
E-Book Collection
Multimedia Collection
Thesis Collection
Transportation Engineering Collection
Periodicals Collections
Green Campus
62 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Select All
1
2
3
4
5
6
00
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
61.
Computer and information security handbook, second edition
Computer and information security handbook, second edition
by
Vacca, John R.
https://go.oreilly.com/library-access/library/view/-/9780123943972/?ar
https://learning.oreilly.com/library/view/~/9780123943972/?ar
Format:
Electronic Resources
62.
Penetration testing : protecting networks and systems
Penetration testing : protecting networks and systems
by
Henry, Kevin M., author.
https://learning.oreilly.com/library/view/~/9781849283731
https://go.oreilly.com/library-access/library/view/-/9781849283731/?ar
https://learning.oreilly.com/library/view/~/9781849283731/?ar
Format:
Electronic Resources
Select All
1
2
3
4
5
6
62 Results Found
Actions:
Add to My Lists
Email
Print
Place Hold(s)
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
Limit Search Results
Narrowed by:
Included
Subject: Computer networks -- Security measures.
Included
Subject: Tests d'intrusion.
Author
Include
Exclude
Gupta, Sunil, speaker.
(4)
Velu, Vijay Kumar, author.
(4)
Sabih, Zaid, on-screen presenter.
(3)
Chebbi, Chiheb, author.
(2)
Duffy, Christopher, author.
(2)
Pearson (Firm), publisher.
(2)
Santos, Omar, presenter.
(2)
Sharma, Himanshu, author.
(2)
Singh, Glen D., author.
(2)
Vacca, John R., editor.
(2)
Ansari, Juned Ahmed, author.
(1)
Baloch, Rafay, author.
(1)
Beggs, Robert, author.
(1)
Beltrame, Jason, author.
(1)
Bindner, Andrew.
(1)
Broad, James.
(1)
Carey, Marcus J. (Cybersecurity professional), author.
(1)
Caudill, Benjamin, author.
(1)
Chauhan, Ajay Singh, author.
(1)
Dion, Jason, on-screen presenter.
(1)
Flow, Sparc, author.
(1)
Fosaaen, Karl, author.
(1)
Gilbert, Karl, author.
(1)
Gradisteanu, Cristian, speaker.
(1)
Guzman, Aaron, author.
(1)
Hackers Academy, issuing body.
(1)
Henry, Kevin M., author.
(1)
Hixon, Michael, author.
(1)
Horton, Charles, author.
(1)
Hutchens, Justin, author.
(1)
Jin, Jennifer.
(1)
Khawaja, Gus, author.
(1)
Krahenbill, Cliff, presenter.
(1)
Lozano, Carlos A., author.
(1)
Marshall, Joseph, author.
(1)
Martorella, Christian, author.
(1)
McPhee, Michael, author.
(1)
Messier, Ric, author.
(1)
Middleton, Bruce, 1953- author.
(1)
Naja, Tarek, speaker.
(1)
Najera-Gutierrez, Gilberto, author.
(1)
Neely, Matthew.
(1)
Okeyode, David, author.
(1)
Oriyano, Sean-Philip, author.
(1)
Ozkaya, Erdal, author.
(1)
Packt Publishing, publisher.
(1)
Parasram, Shiva V. N., author.
(1)
Pauli, Joshua J.
(1)
Prasad, Prakhar, author.
(1)
Pruteanu, Adrian, author.
(1)
Rajani, Renu, author.
(1)
Ram, Jilumudi Raghu, author.
(1)
Rehim, Rejah, author.
(1)
Revay, Geri, on-screen presenter.
(1)
Sabih, Zaid, author.
(1)
Safari, an O'Reilly Media Company.
(1)
Sairam, Jetty, author.
(1)
Sak, Brian, author.
(1)
Santos, Omar, on-screen presenter.
(1)
Shah, Dhruv, author.
(1)
Smith, Paul.
(1)
Vacca, John R.
(1)
Walikar, Riyaz Ahemed, author.
(1)
Wear, Sunny, author.
(1)
Wilhelm, Thomas.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
(62)
Language
Include
Exclude
English
(60)
Chinese
(2)
Publication Date
Include
Exclude
This graph shows the distribution of publication dates for use with a date range slider. Switch to Years view for a more detailed breakdown of search results by year.
From Publication Year
-
To Publication Year
2018
(23)
2017
(10)
2019
(10)
2016
(5)
2021
(4)
2013
(3)
2014
(3)
2015
(2)
2012
(1)
2020
(1)
2022
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Penetration testing (Computer security)
(62)
Réseaux d'ordinateurs -- Sécurité -- Mesures.
(62)
Electronic books.
(31)
Computer security.
(23)
Kali Linux.
(20)
Sécurité informatique.
(20)
Hacking.
(15)
Piratage informatique.
(15)
COMPUTERS -- Security -- General.
(11)
Computer Security
(10)
Application software -- Testing.
(8)
Computers -- Access control.
(7)
Electronic videos.
(7)
Ordinateurs -- Accès -- Contrôle.
(7)
COMPUTERS -- Networking -- Security.
(6)
COMPUTERS -- Internet -- Security.
(5)
COMPUTERS -- Security -- Networking.
(5)
Python (Computer program language)
(5)
Python (Langage de programmation)
(5)
COMPUTERS / Security / General.
(3)
Films autres que de fiction.
(3)
Films de formation.
(3)
Instructional films.
(3)
Internet videos.
(3)
Nonfiction films.
(3)
Vidéos sur Internet.
(3)
Web sites -- Security measures.
(3)
Webcast
(3)
COMPUTERS -- Networking -- General.
(2)
COMPUTERS -- Programming Languages -- Python.
(2)
Computers -- Security -- General.
(2)
Hackers.
(2)
Ingénierie sociale.
(2)
Network security.
(2)
Operating systems.
(2)
Pirates informatiques.
(2)
Sites Web -- Sécurité -- Mesures.
(2)
Social engineering.
(2)
Amazon Web Services (Firm)
(1)
Applications Web -- Sécurité -- Mesures.
(1)
Applications Web.
(1)
Apprentissage automatique.
(1)
Automation -- Security measures.
(1)
Automatisation -- Sécurité -- Mesures.
(1)
BUSINESS & ECONOMICS -- Infrastructure.
(1)
COMPUTERS -- General.
(1)
COMPUTERS -- Microprocessors.
(1)
COMPUTERS -- Programming Languages -- General.
(1)
COMPUTERS -- Security -- Cryptography & Encryption.
(1)
COMPUTERS -- Security -- Online Safety & Privacy.
(1)
COMPUTERS -- Software Development & Engineering -- Quality Assurance & Testing.
(1)
COMPUTERS / Programming Languages / Python.
(1)
COMPUTERS / Security / Networking.
(1)
COMPUTERS / Software Development & Engineering / General.
(1)
Centres de traitement de l'information -- Sécurité -- Mesures.
(1)
Cloud computing -- Security measures.
(1)
Cloud computing.
(1)
Coding theory & cryptology.
(1)
Computer crimes -- Investigation.
(1)
Computer crimes -- Prevention.
(1)
Computer networks -- Monitoring.
(1)
Computer networks -- Testing.
(1)
Computer security -- Evaluation.
(1)
Computer security -- Management.
(1)
Computer security -- Testing.
(1)
Computer software -- Testing.
(1)
Computers -- Networking -- Security.
(1)
Computers -- Operating Systems -- General.
(1)
Computers -- Operating Systems -- UNIX.
(1)
Computers -- Security -- Cryptography.
(1)
Computersicherheit
(1)
Criminalité informatique -- Enquêtes.
(1)
Data encryption.
(1)
Datenschutz
(1)
Datensicherung
(1)
Electronic data processing departments -- Security measures.
(1)
Embedded Internet devices.
(1)
Guides et manuels.
(1)
Handbook
(1)
Handbooks and manuals.
(1)
Industrie -- Sécurité -- Mesures.
(1)
Industries -- Security measures.
(1)
Infonuagique -- Sécurité -- Mesures.
(1)
Infonuagique.
(1)
Information technology -- Management.
(1)
Information technology -- Security measures -- Management.
(1)
Informationssystem
(1)
Internet -- Security measures.
(1)
Internet -- Sécurité -- Mesures.
(1)
Internet des objets.
(1)
Internet intégré.
(1)
Internet of things.
(1)
LAW -- Forensic Science.
(1)
Livres électroniques.
(1)
Machine learning.
(1)
Metasploit (Electronic resource)
(1)
Microsoft Azure (Computing platform)
(1)
Privacy & data protection.
(1)
Raspberry Pi (Computer)
(1)
Raspberry Pi (Ordinateur)
(1)
Rechnernetz
(1)
Réseaux d'ordinateurs -- Surveillance.
(1)
SOCIAL SCIENCE -- General.
(1)
Sécurité informatique -- Gestion.
(1)
Sécurité informatique -- Évaluation.
(1)
Technologie de l'information -- Gestion.
(1)
Technologie de l'information -- Sécurité -- Mesures -- Gestion.
(1)
Web applications -- Security measures.
(1)
Web applications -- Testing.
(1)
Web applications.
(1)
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
O'reilly E-Books
(62)
Library
Include
Exclude
IYTE Library
(62)
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}